Change logs for refpolicy source package in Utopic

  • refpolicy (2:2.20140421-4) unstable; urgency=medium
    
    
      * Team upload.
      * debian/rules: Properly expand flavour directory during build
      * debian/rules: Properly remove postrm scripts in clean target
      * debian/postinst.policy: Remove the modules that are not built anymore from
        the notdefault list
      * debian/postinst.policy: Remove the .disabled file for the modules that are
        now built in the base.pp or not built anymore at all.
    
     -- Laurent Bigonville <email address hidden>  Sun, 29 Jun 2014 17:33:39 +0200
  • refpolicy (2:2.20140421-3) unstable; urgency=medium
    
    
      * Allow sysadm_t to read policy
      * Make systemd_login_list_pid_dirs() call init_search_pid_dirs() as it
        doesn't work without it
      * Added chromium/google-chrome policy
      * dev_getattr_sysfs(sysstat_t) for Debian cron job
      * Allow sysstat_t to manage it's log files
      * Allow dpkg_script_t to config all systemd services and get init status
      * Allow dpkg_script_t to dirmngr_admin
      * really added systemd_login_list_pid_dirs(system_dbusd_t) (somehow missed
        this last time)
      * Allow sshd to chat with systemd via dbus
      * Allow unconfined_t to restart services
      * systemd_write_inherited_logind_sessions_pipes(system_dbusd_t)
      * systemd_dbus_chat_logind(sshd_t)
      * Allow xend to read vm sysctls
      * Allow udev_t to manage xenfs_t files for xenstore-read
      * Allow system_dbusd_t systemd_login_read_pid_files access for
        /run/systemd/users/* files
      * Allow systemd_logind_t to stat tmpfs_t filesystems for /run/user
      * Remove the "genfscon selinuxfs" line from selinux.if in selinux-policy-dev
        to stop sepolgen-ifgen errors.
      * Make udev_relabelto_db() include lnk_file relabeling
      * Allow kernel_t to fs_search_tmpfs, selinux_compute_create_context, and
        kernel_read_unlabeled_state for booting without unconfined.pp
      * Allow system_cronjob_t to manage the apt cache
      * Allow modutils_read_module_config(init_t) and create cgroup_t links for
        strict config. Allow it to relabel from tmpfs_t symlinks
      * Allow init_run_all_scripts_domain (initrc_t) the service { status start
        stop } for all the daemon _initrc_exec_t scripts.
      * Allow sysadm_r to have domain system_mail_t for strict policy
      * Allow init_t to relabel device_t symlinks and pstore_t dirs, load kernel
        modules, manage init_var_run_t sock_files, read /usr, read /dev/urandom,
        systemd_manage_passwd_run, and domain_read_all_domains_state
    
     -- Russell Coker <email address hidden>  Sun, 29 Jun 2014 19:11:45 +1000
  • refpolicy (2:2.20140421-2) unstable; urgency=medium
    
    
      * Fix systemd support
      * Made init, logging, authlogin, application, userdomain, systemd, dmesg,
        dpkg, usermanage, libraries, fstools, miscfiles, mount, selinuxutil,
        storage and sysnetwork be base modules - some of this is needed for
        systemd, some just makes sense.
      * Disabled modules anaconda, authbind, kudzu, portage, rhgb, speedtouch
      * Allow syslogd_t to read /dev/urandom (for systemd)
      * Change unit files to use .*\.service
      * Default trans syslogd_tmp_t for name /run/log (for systemd)
      * Make /var/auth a mountpoint
      * Allow systemd_tmpfiles_t to relabelto xconsole_device_t
      * Allow init_t to start and stop service systemd_unit_file_t
      * Allow udev_t to write to init_t stream sockets for systemctl
      * Allow syslogd_t to read udev_var_run_t so systemd_journal can get seat data
      * Allow systemd_logind_t to read udev_var_run_t for seat data
      * Allow syslogd_t setgid and setgid for systemd_journal
      * Allow udev_t to read cgroup files for systemd-udevd to read it's own cgroup
      * Give logrotate_t the systemd_systemctl_domain access to restart daemons
      * Make transition from unconfined_t to insmod_t for running modutils and
        remove all unused modutils domains. Make unconfined_t transition to
        insmod_t, this makes depmod run as insmod_t. Make insmod_t write modules
        dep files with the correct context.
      * Allow udev_t to load kernel modules for systemd-udevd
      * Allow initrc_t to systemd_config_all_services
      * Allow lvm_t to talk to init_t via unix socket for systemd
      * Allow allow lvm_t to read sysctl_crypto_t
      * Allow udev_t to read modules_object_t for systemd-udevd
      * Allow udev_t to search /run/systemd for systemd-udevd
      * Allow systemd_tmpfiles_t to relabel man_cache_t
      * Allow initrc_t to get status of init_t for systemd
      * Allow udev_t to get initrc_exec_t service status for when udev runs hdparm
        script
    
      * Allow ifconfig_t to load kernel modules
      * Allow named_t to read vm sysctls
      * Allow tor_t capabilities chown dac_read_search dac_override fowner
      * Allow fetchmail_t to manage dirs of type fetchmail_uidl_cache_t
      * Allow mysqld_t to connect to itself on unix_stream_socket
      * Allow mysqld_t kernel_read_vm_sysctls for overcommit_memory
      * Allow sysstat_t read and write access to crond_tmp_t (for cron to capture
        stdout/stderr).
      * Allow sysstat_t to read it's own log files and read shell_exec_t
      * Included file context for /run/kdm.pid
      * Allow kerneloops_t to read /proc/filesystems
      * Label /var/cache/dirmngr as dirmngr_var_lib_t
      * systemd_login_list_pid_dirs(system_dbusd_t)
    
     -- Russell Coker <email address hidden>  Wed, 25 Jun 2014 15:38:58 +1000
  • refpolicy (2:2.20140421-1) unstable; urgency=medium
    
    
      * Team upload.
      * New GIT snapshot of the policy
        - Drop debian/patches/upstream/*.patch: Applied upstream
        - Label /etc/locale.alias as locale_t (Closes: #707246)
        - Allow xdm_t to execute gkeyringd_domains and to transition to them
        - Label postgresql manpages properly (Closes: #740591)
        - Allow setfiles_t and restorecond_t to getattr from all fs that support
          xattr (Closes: #740682)
      * Refresh debian/modules.conf.default, debian/modules.conf.mls: Start
        building the shibboleth module
    
     -- Laurent Bigonville <email address hidden>  Mon, 21 Apr 2014 23:37:53 +0200
  • refpolicy (2:2.20140206-1) unstable; urgency=medium
    
    
      * Team upload.
      * New GIT snapshot of the policy
        - Allow unconfined_u user to enter system_r role again (Closes: #732857)
        - Allow unconfined user to transition to dpkg_t and transitively to
          dpkg_script_t (Closes: #707214)
        - Refresh 0004-init-startpar-initrc_t-gets-attributes-of-dev-dm-0-d.patch
        - Drop d/p/0005-add-missing-newline.patch,
          d/p/0006-allow-udev-write-rulesd.patch: Applied upstream
      * debian/selinux-policy-dev.post{inst,rm}: Call sepolgen-ifgen after
        selinux-policy-dev installation if SELinux is enabled
      * debian/selinux-policy-dev.install, debian/rules: Install headers in
        /usr/share/selinux/devel, there is no differences between default and mls
        headers, so it's not necessary to install both.
      * debian/rules, debian/example/Makefile, debian/Makefile.devel: Fix
        development Makefile to work with new headers location
      * debian/control: Bump Standards-Version to 3.9.5 (no further changes)
    
     -- Laurent Bigonville <email address hidden>  Thu, 06 Feb 2014 21:56:55 +0100